Millennium and the Joint Commission Management of Information Accreditation Requirements April 23, 2010 Introduction The purpose of this white paper is to provide information as to the positioning of Millennium in support of enabling the ability of clients to comply with the Management of Information accreditation requirements of the Joint Commission. The source for the accreditation requirements is the 2010 Comprehensive Accreditation Manual for Hospitals (CAMH) published by the Joint Commission. General Focus of the Requirements The general focus of the accreditation requirements for Management of Information within the CAMH can be summarized as follows: - - - The provider generally needs to have information management processes in place to assure that the information systems and content are available to meet the needs of their programs and services That information privacy and confidentiality of patient information is upheld That the security and integrity of information is enabled That availability and continuity of information is supported That appropriate systems and mechanisms to properly capture, report, process, store, retrieve, disseminate and display clinical and non-clinical information are enabled That information required for decision making is provided That significant medical reference libraries and resources are available to staff and practitioners Millennium’s Role in Enabling Compliance Many of the requirements found within the Management of Information section of the Joint Commission accreditation requirements are focused on how providers put into place policies and procedures to establish requirements for the content of the medical record, assuring its completeness, timeliness and integrity, supporting patient rights to privacy and enabling adequate security capabilities to ensure integrity of the record. These policies and procedures are supported by education and training. However, there are very significant system roles that Millennium can play in support of these activities. At a summary level, these can include (key Millennium solutions indicated parenthetically): - Enabling the capture, storage and maintenance of the patient’s electronic medical record in a complete and accurate manner (All Millennium clinical and ancillary solutions) Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. - - - - - Supporting access controls to limit access to and use of a patient’s electronic medical record to authorized individuals in a manner appropriate to the roles of such individuals in providing care or supporting care (NOTE: This is a general statement relative to both Millennium Authentication and Authorization Security and the access controls present in non-Millennium solutions integrated with Millennium such as PowerInsight) Providing systems of audit to capture accesses to electronic medical records in order to enforce and provide accountability to the privacy and security policies of a provider (Millennium Audit Services and P2 Sentinel) Supporting continuous availability of the patient’s electronic medical record with disaster recovery and business continuity capabilities to sustain access during business interruptions and emergencies (Disaster Recovery/Business Continuity Services from Cerner Technology, Failover processes and Transaction Recovery from Application and Technical Architecture, PowerChart 7x24 Access from Cerner TechWorks, Remote Hosting Services from CernerWorks) Providing validation capabilities of data entered into the electronic medical record based on use of code set values, required field entry rules, reference ranges, format validity rules and other methods (Core capability common to all solutions) Supporting required data entry parameters in forms design to assure completeness of entry (Core capability common to all solutions) At a more granular level, Millennium can assist in enabling compliance with the Management of Information requirements in the following ways (NOTE: Specific Joint Commission accreditation requirements are stated followed by the abilities of Millennium to enable compliance). The Joint Commission requirements that are highlighted for comment are those that seem to most directly imply a system role in compliance. IM.01.01.03 – The hospital plans for continuity of its information management processes - - The hospital has a written plan for managing interruptions to its information processes The hospital’s plan for managing interruptions to information processes addresses the following: Scheduled and unscheduled interruption of electronic information systems, training for staff and LIPs on alternative procedures to follow when electronic information systems are unavailable, backup of electronic information systems The hospital’s plan for managing interruptions to electronic information processes is tested for effectiveness according to time frames defined by the organization The system enables an overall business continuity strategy that includes solutions to manage for the automated rollover of the system to standing redundant hardware and software in case of unscheduled interruptions due to critical component failure in a production system. This capability includes the ability to log and replay transactions necessary to assure timely and complete recovery from an interruption of service of this kind. An overall strategy is recommended to implement a redundant Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. configuration all the way across the board from network to processor to database to servers. A remote recovery site is recommended that is off site to the primary computing facility to guard against the loss of a primary site should the outage be of a more complete variety that not only may threaten component level failure but total system outage for a primary facility. Remote system management services are also offered to help enable this. For shorter periods of planned and unplanned downtime, patient data access can be enabled for the end user in a read-only mode to allow for planned maintenance of the system where a complete failover to a DR system is not feasible or necessary. This functionality assumes only portions of the system will be unavailable. In the event of a short downtime where more of the required infrastructure is not available or the Network is unavailable, local applications can be run even in the absence of connectivity to the application services of the main system. For more extended periods of downtime, technologies and mechanisms such as those discussed above are recommended tactics for mitigating such downtime. Cerner provides recommendations for the testing of business continuity/disaster recovery plans that involve the system. The system is capable of running backups while the system is operational – Cerner has upgraded its software installation tools to minimize system disruption due to code introduction – Cerner uses capabilities like 724Access Downtime Viewer and 724Access Read-Only to allow for access to the clinical data during scheduled downtimes, and Cerner provides environment management tools to help provide for efficient code and reference or activity data management during scheduled downtime. Cerner provides clients with recommended back up procedures for normal scheduled backups whether of a daily, weekly or periodic nature. See white paper on Millennium and the Joint Commission Environment of Care requirements for additional information. • The hospital implements its plan for managing interruptions to information processes to maintain access to information needed for patient care Through its Immediate Response Center (IRC) and through its remote facilities management services, Cerner provides support to clients that have to implement their business continuity/disaster recovery plan should the situation arise. More information on these services and capabilities may be had by contacting Cerner Technologies. Relative to Cerner’s remote hosting services provided through CernerWorks, disruption to a contracted service. A fully redundant, N+1 Infrastructure is utilized for all Production environments hosted at CernerWorks Data Centers. Two separate telecommunication providers are used to provide diverse network paths from the client site to the CernerWorks Data Center. (Some clients may have elected not to Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. have some of the redundant Infrastructure components in an effort to reduce costs. This affects their service availability in the case of an interruption of service). System backups are conducted in compliance with the CTC Backup Procedure or Enterprise Backup Procedure (utilizing the EMC Networker solution) to provide a method to restore a system in case of a disaster. In the event there are multiple failures of the same component type (e.g. both redundant network switches are disrupted) CernerWorks will make commercially reasonable efforts to repair or replace the failed components and return the affected service(s) to normal operation. Should an event occur that precludes delivery of contracted services for an extended period of time, a business continuity/disaster recovery (BCDR) plan will be activated. Quarterly BCDR testing includes executing the emergency mode operating plan, retrieval of media from off-site location, restoration of client environments at a second facility, and redirection of telecommunications as needed. Restoration precedence is based on analysis of several factors including data criticality and is available to contracted clients on request. The plan is regularly reviewed and updated as needed by CernerWorks personnel, and test documentation is audited by Regulatory Affairs and the CernerWorks Compliance Specialist to ensure compliance. For client-hosted clients Cerner Technologies can assist in the system integration of Cerner’s backup strategies with Enterprise backup solutions if desired. IM.02.01.01 – The hospital protects the privacy of health information - The hospital implements its policy on the privacy of health information The hospital discloses health information only as authorized by the patient or as otherwise consistent with law and regulation The hospital uses health information only for purposes as required by law and regulation and as further limited by its policy on privacy The system provides a variety of disclosure log mechanisms for outputs from the electronic health record maintained by Millennium whether through clinical reporting, remote web access, output events done by end users or other means. Much of this logging is enabled through Millennium’s core audit services for logging to P2 Sentinel, and some of it is enabled for disclosure logging through Clinical Reporting XR (or its legacy equivalent, Clinical Reporting WIN32). The system helps assure the privacy of identifiable patient information through its security mechanisms that require a specifically identified user to successfully authenticate to the system in order to then be an authorized user of system resources. The authentication can be performed by a variety of mechanisms including advanced authentication techniques such as by biometrics. Initial levels of capability to enable single sign-on between Millennium and other solutions intended for integrated use with Millennium such as PowerInsight or P2 Sentinel (access audit solution) is in process, and capabilities to authenticate to external user directories also are available. Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. The authorization policies supported by the access control module of the system provide for role based application task access, and for both role and user based data access to patient encounters and clinical data within encounters. The access control capabilities also enable limiting user accesses to certain organizations and locations within organizations appropriate to user need to know (e.g. by patient location) and to work areas where the user is assigned to work (e.g. service resources as performing work sites). User abilities to search for patients in the system can be wholly constrained through task security or limited to those patients who have been admitted or registered to provider organizations where the user is on staff and authorized to access patient records. Specific confidential conditions on particular patient data implemented in support of patient requested restrictions for “seals” on data or for protecting classes of information required to be so protected by statute are dependent either on limiting authorized accesses to users in care providing roles with access to specific data types on a need to know basis or based upon the ability to identify affected “confidential” encounters within which the affected data resides. Additionally, the system does support denial of access to the electronic medical record for a specific patient from access by a named user. This restriction can be implemented at the person level. Aside from that, the system does not offer the ability at present to mark specific parts of an individual patient record as protected from access (or that are subject to specific grants of access) by certain named individuals or roles. Also, as a general rule, the application tasks in the system have been designed to display information about specific types of clinical data, and with patient demographics appropriate to the purpose at hand. On line forms and formatted structured output of clinical data can also generally be designed to be limited to the purpose of the form or output. Relative to printing information for clinical use out of Clinical Reporting, the system supports the ability of a user to print clinical information to be consistent with the user’s online access rights to patient information. Within Clinical Reporting, sensitive result sections can be identified, and as applied to release of information from the electronic medical record, when a user goes to print, the user has to both have security to access the sensitive data online and then to be able select them for printing. For normal clinical report distributions done through operations, the system enables printing what is called for by the relevant clinical report format at hand. Relative to Cerner’s remote hosting services provided through CernerWorks, Cerner’s Protection of Patient Information standard operating procedure outlines proper methods for viewing, handling, printing, transmitting and disposing of patient information from workstations or other access devices to ensure the privacy and confidentiality of the information. Workstation security is accomplished using a combination of safeguards that includes both physical restriction and control to the facility as well as technical safeguards such as intrusion detection, anti-virus software, firewalls and password management. In order to meet regulatory and Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. contractual requirements relating to privacy and security, Cerner is obligated to require that all Associates handle patient information appropriately. It is Cerner’s mandatory policy that Associates must ensure the proper use of patient information as we assist our clients in implementing, supporting and hosting their information systems. This means that Cerner Associates and Consultants must not engage in any activity that may inappropriately use or disclose protected health information. Failure to comply with this requirement will result in sanction, up to and including termination of employment/service agreement. To assure privacy of information that is disclosed where identifiable information is not required, the system supports development of extracts and reports through its report writer capabilities to output information in the appropriate format per the reporting requirement. The system also enables pseudonymization (through HealthFacts) and anonymization (through PowerInsight) of patient identifiers in support of data aggregation needs for analytical purposes. PowerInsight also supports reporting of aggregated data if that is the basis of need. The system also can enable any identifying patient information to be effectively screened out, and apply security to prevent access to identifiable patient data from within a reporting context. When the need for identifiable patient information to fulfill a release of information request is specified, the system also supports release of information management capabilities to distinguish types of release requests, and the patient authorization requirements for given types of releases. The system can require that indication that patient authorization has been obtained be documented before proceeding with release of information for particular types of releases. • The hospital monitors compliance with its policy on the privacy of health information See response to IM.02.01.03 below for audit capabilities available within the system and through P2 Sentinel to enable audit of compliance with the privacy policies of the hospital. IM.02.01.03 – The hospital maintains the security and integrity of health information - The hospital monitors compliance with its policies on the security and integrity of health information The hospital protects against unauthorized access, use and disclosure of health information See response to IM.02.01.01 above for information on access control capabilities to support authorized access to personal health information. For enforcing the security and privacy policies of the hospital, the system enables the recording of accesses to a patient’s electronic medical record thus supporting holding users of a patient’s electronic information accountable for their activities. Such Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. accesses may include both activities to create or maintain information in the patient’s record as well as activities to inquire into or output information from the patient’s record. The system makes available the audit trail of such accesses for transmission to externally maintained audit log systems for retention and analysis. The audit system (called P2 Sentinel) made available to accompany Millennium implementations enables both predefined and ad hoc queries into audit data of this kind as well as alerting of appropriate privacy or security officers or auditors on a real time basis should suspect access conditions occur. - The hospital protects health information against loss, damage, unauthorized alteration, unintentional change and accidental destruction The hospital controls the intentional destruction of health information The system enables encryption technologies to be used for protection of the integrity of patient data that is communicated or stored electronically. Among these capabilities are the abilities to: • • • Protect information used during an end user session through session encryption available through Citrix Protect information communicated electronically across a network for clients hosted by Cerner’s CernerWorks application service hosting facility using encryption available in the IPSec VPN Protect information for data stored in Cerner’s CernerWorks application service hosting facility and for off line storage using encryption capabilities available through the Storage Area Network (SAN) technologies used by Cerner The system also enables implementation of secure configurations that include components designed to guard against unauthorized intrusion that may result in data corruption, damage or loss. The system is typically operated behind a firewall or on a closed network or virtual private network if a local installation. When the system is hosted by Cerner, it is hosted behind a secure firewall with secure communications supported by Transport Layer Security (TLS) and with secure sessions served up by Citrix. Beyond this, unauthorized access is mitigated by the authentication and authorization capabilities of the security architecture of the system that requires users to be specifically identified and authenticated before being allowed to access system resources, and to only be able to access system resources (and patient records) in an authorized manner as understood by the access control capabilities of the system. As to more technical security measures enabled around the system, the system enables application of security components to assure a secure configuration of the desktop, operating system and backend, and to maintain currency with new releases of such capabilities relative to those components. Sound system management and change management practices are recommended to ensure that only certified system components are installed in production environments after they have been subjected to verification in test environments. Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. The system makes use of registered application service requests, and the system’s application services only recognize requests from client applications that make use of one of the registered service requests. When the system is sent a message from a different system, the system makes use of device authentication to support message acknowledgment for interfacing so as to assure exchange of information with a trusted source or destination. The system also can leverage secure communication capabilities present in network communication protocols to assure message integrity for information in transit (such as by use of Secure Socket Layer/Transport Layer Security based encryption). The system can make use of virtual private networks (VPNs) to enable closing a network from public access to mitigate unauthorized intrusion. The system also supports use of session encryption for Citrix based sessions as well as for the audit system used for tracking accesses to the electronic medical record. Relative to Cerner’s remote hosting services provided through CernerWorks, Each client is responsible for the integrity of the content, while Cerner manages the integrity of the systems on which data resides. Cerner has written policies for addressing information security that is based on and consistent with law or regulation. Cerner develops and implements controls to safeguard data and information, including the clinical record, against loss, destruction, and tampering using a combination of authentication, authorization, encryption, and backups. System logging provides trails to ensure only authorized individuals actually access a patient record. IM.02.02.01 – The hospital effectively manages the collection of health information • • The hospital uses uniform data sets to standardize data collection throughout the hospital The hospital uses standardized terminology, definitions, abbreviations, acronyms, symbols and dose designations The system also supports use of standardized abbreviations, acronyms and medical vocabularies where and when appropriate to the mode of documentation entry to be used in clinical documentation entry, physician note entry or diagnostic result entry (e.g. such as with the use of American College of Radiology BI-RADS (Breast Imaging Reporting and Data System) codes for Mammography). This helps facilitate standardized entry for required elements of documentation especially where the collection, retrieval and analysis of such data is required to be in standardized meanings and forms to ease such analysis. The system generally enables reporting of management information appropriate to the different patient care units/departments, ancillary areas and administrative functions supported by system applications. These include reporting of activity levels by period, by provider, by shift, acuity levels (on a similar basis as for activity) and turnaround time measures appropriate to a given domain (e.g. order to clinical report for lab procedures, door to triage, door to Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. discharge, etc for the ED). In the ED, this information can be presented through graphical views of information in addition to as reports. The system supports definition of “do not use” abbreviations, acronyms and symbols for reference in medication management, physician documentation entry and order management. Cerner provides recommended starting sets of reference data content for most every major type of reference data or code set used by the system. This content embodies required or industry standard code sets such as common medical code sets (CPT, ICD9, HCPCS, SNOMED CT, LOINC, NDC codes and the like) as well as nonmedical code sets (ANSI X-12, UB04) for administrative reference data. The content also includes reference data starter sets for key reference data tables such as the order catalog, the formulary, the charge master and for registration forms, labels of all kinds, claims/billing formats, and all manners of system configuration settings to ease the implementation process. Cerner also provides an ability to map medical code sets to a common code set value called a concept CKI (Cerner Knowledge Index). For lab values, Cerner allows for mapping of General Lab, Microbiology as of August of 2009 and mapping for Blood Bank results will be available in 2011. As results post to the Clinical Events table, a reference service will associate the appropriate LOINC term to the result in the Clinical Event activity data structure so that the system can enable outbound interfacing using LOINC codes. This will help enable eventual support for HIPAA Claims Attachment requirements by providing the appropriate LOINC reference context for fulfilling the requirements of the HL7 Clinical Document Architecture (CDA) specification for the document types proposed for HIPAA Claims Attachments. Cerner can also post SNOMED CT values to organisms for Microbiology results. For nursing documentation, the system supports use of standardized code sets with mapping of evidence based nursing concepts to standard code sets. Clients can also map in external nursing documentation standards if they wish to Cerner’s starter content or build the mapping out on their own for use in Cerner’s nursing documentation forms. IM.02.02.03 – The hospital retrieves, disseminates and transmits health information in usable formats - The hospital has written policies for addressing data capture, display, transmission and retention The hospital’s storage and retrieval systems make health information accessible when needed for patient care Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. The system enables definition of entry; format and data type requirements for the capture of patient information whether through the definition of registration conversations, the design of clinical documentation templates used for assessments, result entry validation rules for entry of discrete clinical results and other mechanisms. The system supports appropriate processing and storage of patient information to fit the workflow requirements of the particular care process at hand. For example, the system can create scheduled nursing tasks as generated from a care plan that is associated to a patient encounter. This in turn drives the scheduling and completion of nursing activities which can be charted against the assigned nursing tasks. The options for entry for completion of such tasks are defined to support the requirements of the particular type of entry at hand. The information can then be stored as discrete data available for inclusion in nursing documentation and progress notes and used for on line reference or output to care providers that need to be able to make reference to nursing documentation. Patient electronic information is maintained in a real time manner for any updates to the record, and this information is accessible to users on a similar basis as long as in final verified forms as a general rule. In process information may only be accessible to those clinicians and staff responsible for its entry and completion. When clinical information is in such a form, it is instantly available to other care team members, staff and clinicians in that form on line, and can be output to clinical reports for distribution in other forms than as on line as may be required. Clinical report formats can be defined to reflect what is necessary for proper reporting of the result, and distributions can be defined for both printing and faxing to allow for accurate report distribution. Information that is not necessary for long term retention (such as in process data) may be subject to purging, but information necessary for long term retention can be retained on line and/or archived as may be appropriate. The system supports secure transmission of data in support of transaction processing through the use of registered application services (see discussion earlier in this white paper on security capabilities of the system), and through support for the use of private networks or closed networks for supporting secure network communications whether as locally implemented or as hosted by Cerner. The system supports retention of data for periods of time sufficient to comply with statutory or regulatory requirements. Cerner is working on more flexible archive capabilities to allow this to be finer grained, but most clients elect to retain the more permanent forms of patient data indefinitely in the on line medical record with “in process’ activity data tables purged according to more short term information retention policies. - The hospital disseminates data and information in useful formats within time frames that are defined by the hospital and consistent with law and regulation For clinical result reporting, the system enables definition of clinical report formats and distributions appropriate to the type of clinical report at hand, and supportive to the need to distribute reports to the appropriate audiences directly involved in the Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. patient’s care such as to the ordering physician, the patient location where the patient may be roomed as an inpatient, to the ordering location associated to a given diagnostic test order and to other output destinations associated to end clinical report recipients such as in physician offices. The clinical report formats use standard reference data infrastructure to provide for appropriate formatting of demographic and clinical information about the patient significant to the type of clinical data at hand. Clinical reporting (particularly for diagnostic results for lab values and diagnostic radiology reports) can be generated considering the priority of the diagnostic test order, and the recipient can be notified of the results availability if appropriate through messaging to specific physician “inboxes” or to tracking boards (such as in the ED). TAT reporting is available to manage the service levels of diagnostic departments as is discussed in the white paper Millennium and JC Provision of Care Accreditation Requirements and under National Patient Safety Goal 2 in the white paper Millennium and JC NPSG Requirements. The concept CKI provides assistance to map clinical concepts across medical vocabularies, and to assure consistent meaning at a common level for reference data that may be tagged with site specific labels, mnemonics or display values. These help assure that when data is aggregated from multiple sources into the electronic medical record that the data can be seen as holding consistent meaning. This also is key to the system capability to enable the capture and codification of regulatory or quality related data important to quality measurement or outcomes measurement along with operational reporting and interoperability. For management reporting, the system’s enterprise reporting solution, PowerInsight leverages the concept mapping defined with Millennium to assure reliable consistent meaning for data. PowerInsight was designed to externalize decision support data from the Millennium transactional domain into a separate domain which enabled reformatting of the data into a schema that more adequately supported processorintensive queries, retrospective analysis and summary-level reporting. Many reports are created and provided through PowerInsight. These reports provide the ability to study Key Performance Indicators (KPI) and other items of interest. KPIs are high– level metrics that provide an organizational view of the selected data. They are an intersection of a time dimension (last month) and a measure (mortality) that provides the user with a view into the current state of a particular aspect of the organization. The end user is provided access to predefined reports as well as the ability to produce their own ad hoc queries. Additionally, as data marts are added to the solution, new reports will be added. See also the discussions about outcomes measurement contained in the Millennium and JC Leadership Accreditation Requirements whitepaper . Cerner can support ongoing monitoring within the context of a process of continuous engagement with Lighthouse. This includes provision of updates to recommended guidelines and outcome benchmarks used in evaluating performance on an ongoing basis. Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. System also enables benchmarking for certain quality data through HealthFacts solution (see whitepaper on Millennium and the Joint Commission Performance Improvement Accreditation Requirements for more information). PowerInsight supports definition of an external benchmark for use in analysis which can come from that provided by Health Facts or from another external source identified by the provider. Relative to performance improvement, see discussion on process modeling and outcomes monitoring in the white paper Millennium and JC Leadership Accreditation Requirements. Relative to infection control and patient safety incident related reporting, the system may be a data source for those, but risk management and infection control types of reporting are not typically driven directly from the system. IM.03.01.01 – Knowledge based information resources are available, current and authoritative • The hospital provides access to knowledge based information resources 24 hours a day, 7 days a week The system enables reference to on line reference libraries and medical literature as appropriate to certain contexts. As two examples - Reference to Multum information is enabled for support of the medication management process. Access to physician reference materials is enabled through the Powerchart. References to the underlying literature review citations are also available in the context of expert decision support rules applied to clinical events such as orders when there are contraindications present. Clients may also use these capabilities to maintain their own reference links to on line resources. For those clients supported by Cerner’s remote hosting services through CernerWorks, Cerner performs regular updates to the drug interaction database supported by Multum on a monthly basis. For mental health services, online links are not made available as a part of the predefined recommended content – there is some reference text that can be made available on the PowerForms as to the significance of the need to document particular information – but reference text is not widely provided with Cerner’s recommended content. For nursing, the system generally supports access to online knowledge resources through hyperlinks or through enabling a web browser to be launched from within Powerchart. Clients can also link in their own intranet resources as desired through links from within the nursing application. Any Cerner provided links are maintained as a part of the START database. Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner. For physicians, the system enables a URL to be embedded in a physician note, and users can access the reference data behind the URL contained within a physician note. For those references provided by Cerner as content, the URLs are maintained on an annual basis. IM.04.01.01 – The hospital maintains accurate information - The hospital has processes to check the accuracy of health information See responses given elsewhere in this whitepaper for information on how the system helps assure data integrity, accuracy and validity. Cerner Corporation Confidential Information ©Cerner Corporation. All rights reserved. This document contains confidential and/or proprietary information which may not be reproduced or transmitted without the express written consent of Cerner.